Compromise-resilient anonymous mutual authentication scheme for n by m-times ubiquitous mobile cloud computing services.
Oladayo Olufemi OlakanmiKehinde Oluwasesan OdeyemiPublished in: Comput. Secur. (2021)
Keyphrases
- cloud computing
- authentication scheme
- internet services
- middleware architecture
- service providers
- location aware
- computing resources
- context aware
- cloud platform
- smart card
- network access
- ubiquitous computing
- cloud services
- private cloud
- data center
- pervasive computing
- data management
- mobile applications
- service level agreements
- mobile computing
- computing infrastructure
- mobile services
- user authentication
- secret key
- web services
- public key
- utility computing
- security analysis
- authentication protocol
- computing environments
- mobile devices
- mobile phone
- security issues
- smart phones
- software as a service
- data analysis
- mobile terminals
- mobile users
- trusted computing
- service oriented
- end users